The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.
Background: Polymethylmethacrylate (PMMA) is the most ‎commonly used mâ€aterial in denture construction. This material is ‎far from ideal in fulfilling the‎ mechanical requirements, like low impact and transverse strength and poor thermal conductivity are present in this material. The purpose of this study was to study the effect of addition a composite which include 1%wt silanized silicone dioxide nano fillers (SiO2) and 1wt% oxygen plasma treated polypropylene fiber (PP) on some properties of heat cured acrylic resin denture base material (PMMA). Materials and methods: One hundâ€red (100) prepared specimens were divided into five groups according to the tests, each group consisted of 20 specimens and t
Background: Polymethyl methacrylate (PMMA) is the most commonly used material in denture fabrication. The material is far from ideal in fulfilling the mechanical requirement. The purpose of this study was to evaluate the effect of addition of 3% wt of treated (silanized) Titanium oxide Nano filler on some physical and mechanical properties of heat cured acrylic denture base material. Materials and methods: 100 specimens were constructed, 50 specimens were prepared from heat cure PMMA without additives (control) and 50 specimens were prepared from heat cure PMMA with the addition of TiO2 Nano fillers. Each group was divided into 5 sub groups according to the test performed which was mixed by probe ultra-sonication machine. Results: A highly
... Show MoreThis experiment was conducted to examine the effects of injected gibberellic acid GA3 in subcutaneous of hens neck and supplemental vitamin D3 to control basal diet on productive performance and egg shell thickness ,relative weight of egg shell of aged laying hens. Two hundred and seventy Lohmann Brown laying hens at 73 weeks of age were randomly assigned to three treatments groups. Each treatment consist of three replicates (30 hens / replicate). The treatments were : T1 control were injected subcutaneous with 0.2 ml / kg of body weight of ethanol: sesame oil solution, T2 and T3 were injected subcutaneous with 0.2 ml / kg of body weight of ethanol: sesame oil solution which contained 400 μg GA3/ kg of body weight /week during 8 weeks (tre
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreIn the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show More